Description
Microsoft Internet Explorer 6.0 on Windows NT 4.0 SP6a, Windows 2000 SP4, Windows XP SP1, Windows XP SP2, and Windows Server 2003 SP1 allows remote attackers to cause a denial of service (client crash) via a certain combination of a malformed HTML file and a CSS file that triggers a null dereference, probably related to rendering of a DIV element that contains a malformed IMG tag, as demonstrated by IEcrash.htm and IEcrash.rar.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
https://www.exploit-db.com/exploits/26457
References (3)
Core 3
Core References
Third Party Advisory mailing-list
x_refsource_fulldisc
http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0127.html
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/15268
Exploit mailing-list
x_refsource_fulldisc
http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0673.html
Scores
EPSS
0.1755
EPSS Percentile
95.2%
Details
Status
published
Products (6)
microsoft/ie
6.0 sp1 (2 CPE variants)
microsoft/internet_explorer
6.0
microsoft/windows_2000
microsoft/windows_2003_server
sp1
microsoft/windows_nt
4.0 sp6a
microsoft/windows_xp
(2 CPE variants)
Published
Dec 31, 2005
Tracked Since
Feb 18, 2026